Preferred Language
Articles
/
abaa-291
The Role of Media Coverage of the Iraqi Satellite Channels in Shaping Public Attitudes towards Terrorism (a Field Study of a Sample of an Audience of the City of Baghdad)
...Show More Authors

Violence is one of the most serious threats facing societies because it affects their internal structure and threatens the security and stability of society. It is classified as one of the types of security crises that are emerging in Arab and Islamic societies in particular, and in most countries of the world in general.

The threat of this crisis is increasing. Terrorism is considered as one of the most serious aspects of that all the countries of the world, currently, suffer from. The terrorism has begun to penetrate deep into society in one way or another starting from the Second World War, which led to the emergence of leftist movements in Western Europe, Japan, France, Italy and other countries as a result of emerging ideas and ideologies aimed at political change, especially with the end of the sixties of the twentieth century.

This period witnessed growing the phenomenon of terrorism; extending the impact of this phenomenon; and developing terrorist groups whose activities extended beyond their national borders. This led to an expansion of terrorism in what is known as international terrorism.

Terrorist attacks began to appear in Arab and Muslim societies from time to time. Therefore, the Arab world witnessed a growing phenomenon of violence and terrorism and the multiplicity of religious political violence organizations that differed from other violent currents in other regions of the world.

The risk of terrorist operations is greater if they originate from ideological or economic interests that serve a certain group, and whose influence on members of society widens so that innocent and protected lives are destroyed. This causes waste private and public property; and spreads terror and panic in the areas where they operate. Such terror activities lead to shaking security and stability and spread fear among individuals that left large numbers of innocent casualties.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed May 10 2023
Journal Name
Journal Of Engineering
ADAPTIVE CYCLIC PREFIX LENGTH FOR CONVOLUITIONAL CODE OFDM SYSTEM IN FREQUENCY SELECTIVE CHANNEL
...Show More Authors

Orthogonal Frequency Division Multiplexing (OFDM) is one of recent years multicarrier modulation used in order to combat the Inter Symbol Interference (ISI) introduced by frequency selective mobile radio channel. The circular extension of the data symbol, commonly referred to as cyclic prefix is one of the key elements in an OFDM transmission scheme. This paper study The influence of the cyclic prefix duration on the BER performance of an OFDM-VCPL (Orthogonal frequency division multiplexing - Variable Cyclic Prefix Length) system and the conventional OFDM system with frame 64-QAM modulation is evaluated by means of computer simulation in a multipath fading channel. The adaptation of CP is done with respect to the delay spread estimation

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Dec 01 2016
Journal Name
Bulletin Of The Iraq Natural History Museum (p-issn: 1017-8678 , E-issn: 2311-9799)
REDESCRIPTION AND SOME POLYMORPHISM NOTES IN WORKERS OFCAMPONOTUS XERXESFOREL, 1904 (HYMENOPTERA: FORMICIDAE; FORMICINAE)
...Show More Authors

     The specimens of Camponotusxerxes Forel, 1904 were collected from different localities in Iraq; the purpose of morphological study of this species in details throughout the present study.

 

     The description was based on major workers belonging to this species, also some notes of polymorphism in workers have been mentioned; the most important of morphological features are illustrated and figured.

View Publication Preview PDF
Publication Date
Sat Mar 13 2021
Journal Name
Al-nahrain Journal Of Science
Hiding Multi Short Audio Signals in Color Image by using Fast Fourier Transform
...Show More Authors

Many purposes require communicating audio files between the users using different applications of social media. The security level of these applications is limited; at the same time many audio files are secured and must be accessed by authorized persons only, while, most present works attempt to hide single audio file in certain cover media. In this paper, a new approach of hiding three audio signals with unequal sizes in single color digital image has been proposed using the frequencies transform of this image. In the proposed approach, the Fast Fourier Transform was adopted where each audio signal is embedded in specific region with high frequencies in the frequency spectrum of the cover image to sa

... Show More
View Publication
Scopus (2)
Scopus Crossref
Publication Date
Fri Aug 19 2022
Journal Name
International Journal Of Health Sciences
Interleukin-32, interleukin-33 and acid phosphatase levels in patients with Helicobacter Pylori
...Show More Authors

The study was carried out to detection of H. pylori in (218) patients who attended two teaching hospitals in Baghdad. The diagnosis was done by Immunochromatography methods. Stools and blood samples were taken from each patient as well as other (30) healthy control matching in age. The study included measurement the Levels of Interleukin-32, Interleukin-33, and Acid phosphatase   in sera of patients and control .The result indicated  presence  of H pylori antigen in 115 cases 59 cases  of males and 51 of females , Also, the result indicated  increasing levels of IL-32 and IL-33 and Acid phosphatase  in patients sera  in comparison with healthy control.

View Publication
Crossref
Publication Date
Sun Dec 15 2019
Journal Name
Journal Of Baghdad College Of Dentistry
Maximum bite force in relation to maximum mouth opening among primary school children
...Show More Authors

Background: The vertical distance between the upper and lower incisal edge of the central incisors when the mouth is opened as wide as possible is called maximum mouth opening (MMO). Any pathological change in the masticatory system had a direct effect on the maximal mouth opening. The aim of this study was to evaluate the relationship between the maximum bite force and the maximum mouth opening among group of children. Materials and methods: Four hundred children of both genders were included in this study, their age ranged from eight to ten years. Anterior and posterior (right, left) bite force were measured using bite force sensor. Maximum mouth opening was evaluated by electronic digital caliper. Data was statistically analyzed

... Show More
View Publication
Crossref (1)
Crossref
Publication Date
Mon Dec 01 2014
Journal Name
Bulletin Of The Iraq Natural History Museum (p-issn: 1017-8678 , E-issn: 2311-9799)
FIRST OBSERVATIONS ON PHRYNOCEPHALUS MACULATUS LONGICAUDATUS HAAS, 1957 (SQUAMATA: SAURIA: AGAMIDAE) IN IRAQ
...Show More Authors

    The present paper confirmed the presence of Phrynocephalus maculatus longicaudatus Haas, 1957 in Iraq and recorded the first observations of this taxon in Al-Muthanna province southwestern of Iraq. The existence of the species is yet uncertain in Iraq. The habitat and morphological characteristics of this species were reviewed.

View Publication Preview PDF
Publication Date
Wed Jul 01 2015
Journal Name
Bulletin Of The Iraq Natural History Museum (p-issn: 1017-8678 , E-issn: 2311-9799)
FIRST OBSERVATIONS ON Phrynocephalus maculatus longicaudatus Haas, 1957 (SQUAMATA: SAURIA: AGAMIDAE) IN IRAQ
...Show More Authors

    The present paper confirmed the presence of Phrynocephalus maculatus longicaudatus Haas, 1957 in Iraq and recorded the first observations of this taxon in Al-Muthanna province southwestern of Iraq. The existence of the species is yet uncertain in Iraq. The habitat and morphological characteristics of this species were reviewed.

View Publication Preview PDF
Publication Date
Mon Oct 14 2019
Journal Name
Turkish Journal Of Biology
E2F6 is essential for cell viability in breast cancer cells during replication stress
...Show More Authors

Abstract: E2F6 is a member of the E2F family of transcription factors involved in regulation of a wide variety of genes through both activation and repression. E2F6 has been reported as overexpressed in breast cancers but whether or not this is important for tumor development is unclear. We first checked E2F6 expression in tumor cDNAs and the protein level in a range of breast cancer cell lines. RNA interference-mediated depletion was then used to assess the importance of E2F6 expression in cell lines with regard to cell cycle profile using fluorescence-activated cell sorting and a cell survival assay using (3-(4,5-dimethylthiazol-2-yl)-2,5-diphenyltetrazolium bromide (MTT). The overexpression of E2F6 was confirmed in breast tumor cDNA samp

... Show More
View Publication Preview PDF
Scopus (9)
Crossref (6)
Scopus Clarivate Crossref
Publication Date
Mon Aug 21 2023
Journal Name
Communications In Mathematical Biology And Neuroscience
Delay in eco-epidemiological prey-predator model with predation fear and hunting cooperation
...Show More Authors

It is recognized that organisms live and interact in groups, exposing them to various elements like disease, fear, hunting cooperation, and others. As a result, in this paper, we adopted the construction of a mathematical model that describes the interaction of the prey with the predator when there is an infectious disease, as well as the predator community's characteristic of cooperation in hunting, which generates great fear in the prey community. Furthermore, the presence of an incubation period for the disease provides a delay in disease transmission from diseased predators to healthy predators. This research aims to examine the proposed mathematical model's solution behavior to better understand these elements' impact on an eco-epidemi

... Show More
View Publication
Scopus (8)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Sat Jan 26 2019
Journal Name
Association Of Arab Universities Journal Of Engineering Sciences
Secure Mobile Sink Node location in Wireless Sensor Network using Dynamic Routing Protocol
...Show More Authors

The important device in the Wireless Sensor Network (WSN) is the Sink Node (SN). That is used to store, collect and analyze data from every sensor node in the network. Thus the main role of SN in WSN makes it a big target for traffic analysis attack. Therefore, securing the SN position is a substantial issue. This study presents Security for Mobile Sink Node location using Dynamic Routing Protocol called (SMSNDRP), in order to increase complexity for adversary trying to discover mobile SN location. In addition to that, it minimizes network energy consumption. The proposed protocol which is applied on WSN framework consists of 50 nodes with static and mobile SN. The results havw shown in each round a dynamic change in the route to reach mobi

... Show More